Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identity Finder Client

Similar presentations


Presentation on theme: "Identity Finder Client"— Presentation transcript:

1 Identity Finder Client
Peseng Yu IT Security Analyst

2 Agenda Goal of Identity Finder Identity Finder Policy Settings
Client Overview

3 Goal of Identity Finder
Data discovery See if computers are storing Personally Identifiable Information Minimize or eliminate the amount of sensitive data stored in unneeded locations. Depending on the incident, this could help prevent the amount of data leakage. Protect data-at-rest By finding where sensitive data is stored, each user can help ensure that it is properly encrypted or stored in an acceptable area (e.g. specified network folders for your department or group). User awareness/training Representative from your group will review and tell you to take action on your findings on an ongoing basis (e.g. Monthly).

4 Identity Finder Policy Settings
Monthly Scans e.g. 1st day of each month at 1:00am Periodically (e.g. every 5-10 minutes) the clients report back to the central console to report status and download policy updates What is Identity Finder configured to scan via policy settings? Social Security Numbers Credit Card Numbers Bank Account Numbers Drivers License

5 Client Overview Identity Finder Client uses the “Ribbon” interface (similar to Microsoft Office 2007 and newer) Starting Identity Finder Starting a Scan Address Findings Deleting Temporary Files Securely Deleting Files

6 Starting Identity Finder
After starting the Identity Finder program  All Programs  Identity Finder  You may press “Skip” when asked to specify a “Identity Finder Profile Password” You do not have to create an Identity Finder profile password. You may use the "Guest Profile". However, creating an Identity Finder Profile may be convenient to help you store previous search results for easier reference amongst other features

7 Starting a Scan Press the “Start Search Now” button.
The interface should look like one of the screenshots below:

8 Addressing Findings After the search completes you will see the Identity Finder Search Summary: Choose either “Wizard” or “Advanced”

9 Addressing Findings (Cont.)

10 Addressing Findings (Cont.)
You can preview the file by selecting/clicking a specific Identity Match. The Wizard prompt will help guide you on what actions you would like to take on the files. You can also Right-Click a Finding and select the appropriate option you would like to take. Shred – Securely deletes the file Secure – Utilize Identity Finder to encrypt the file

11 Deleting Temporary Files
Review the Tutorial on the docs.rice.edu website on how to securely delete temporary files using Identity Finder ely+Clean+Up+Temporary+Files+using+Identity+Finder+- +Windows

12 Securely Delete Files Review the Tutorial on the docs.rice.edu website on how to securely delete files using Identity Finder ely+Delete+Files+using+Identity+Finder+-+Windows

13 Helpful References Identity Finder Client User Guides
Windows User Guide: Mac User Guide: Identity Finder FAQ s How to clean up temporary files using Identity Finder ean+Up+Temporary+Files+using+Identity+Finder+-+Windows How to securely delete files using Identity Finder elete+Files+using+Identity+Finder+-+Windows

14 Questions or Comments? Questions?


Download ppt "Identity Finder Client"

Similar presentations


Ads by Google